The existing robust collaborative recommendation algorithms have low robustness against PIA and Ao P attacks. Aiming at the problem, we propose a robust recommendation method based on shilling attack detection and mat...
详细信息
The existing robust collaborative recommendation algorithms have low robustness against PIA and Ao P attacks. Aiming at the problem, we propose a robust recommendation method based on shilling attack detection and matrix factorization model. Firstly, the type of shilling attack is identified based on statistical characteristics of attack profiles. Secondly, we devise corresponding unsupervised detection algorithms for standard attack, Ao P and PIA, and the suspicious users and items are flagged. Finally, we devise a robust recommendation algorithm by combining the proposed shilling attack detection algorithm with matrix factorization model, and conduct experiments on the Movie Lens dataset to demonstrate its effectiveness. Experimental results show that the proposed method exhibits good recommendation precision and excellent robustness for shilling attacks of multiple types.
This paper proposes an automatic data extraction algorithm for web pages based on noise reduction and visualization blocks' construction. In this algorithm, we first build an MD5 trigeminal tree of the web page...
详细信息
Friend recommendation is a fundamental service for both social networks and practical applications. The majority of existing friend-recommendation methods utilize user profiles, social relationships, or static post co...
详细信息
Community detection has become an important challenge during the past decade. Network is divided into some groups or communities that are densely connected to each other inside while less connected to the nodes outsid...
详细信息
Researches on community detection in signed social networks focus on the assignment of positive and negative edges. However, the community detection approaches that positive and negative edges are handled separately i...
详细信息
This paper is concerned with the problem of locating the code area related to software potential fault quickly and accurately in software testing period. A new method Sig BB based on graph model is proposed for mining...
详细信息
This paper is concerned with the problem of locating the code area related to software potential fault quickly and accurately in software testing period. A new method Sig BB based on graph model is proposed for mining the suspicious fault nodes from the passing and failing execution graphs. Representing each execution of a program as a graph, the graphs are divided into the passing and failing sets. By extracting the most representative passing and failing graphs based on these sets, the discriminative sub-graph is mined between the two representative graphs. First, Sig BB searches the max common graph, and then gets the opposite nodes set. The discriminative sub-graph is obtained by organizing and extending the set finally. Since the detected code scale is associated with the sorting of suspicious nodes, a suspicious metric strategy is also designed to sort the nodes in the discriminative sub-graph. Experimental results indicate that our method is both effective and efficient for software fault localization.
Dissimilar path detection is an important task in software behavior detection. Previous dissimilar path mining algorithms ignore time-interval weight and dissimilarity. Therefore, a dissimilar path detecting algorithm...
详细信息
Friend recommendation is popular in social site to help people make new friends and expand their social networks. However, the conventional friend recommendation method is low accuracy for the sparsity of data and col...
详细信息
Vulnerability discovery is at the centre of attention in computer security. Most vulnerability detection methods need considerable human auditing, thus making vulnerability detection inefficient and unreliable. Simila...
详细信息
To solve edge confusion problems in the geo-related graph visualization, here we present an edge bundling algorithm based on the road network information. First, the improved Dijkstra shortest path algorithm is employ...
详细信息
暂无评论